Latest News - Computer Science

Network Defense and Countermeasures

Network Defense and Countermeasures Network defense and countermeasures comprise several different elements: software and hardware. The main aim of network defense is to understand how to keep...

Intrusion Detection Systems and Security Reports

Intrusion Detection Systems and Security Reports Part 1: Intrusion Detection Systems Digital Signatures Signatures are used for the identification or approval of a particular action. The two types...

Network Security

Network Security Part 1: Network Security Fundamentals Nonrepudiation Nonrepudiation is the ability to log and trace any performed action over a secured network, preventing a participant from...

Wireless Exploitation

Wireless Exploitation Part One: Pass the Hash Operating Systems Vulnerable to Hashing Windows operating systems are vulnerable to different attacks, such as hashing attacks. Pass the Hash attacks...

Understanding Metasploitable

Understanding Metasploitable Web Exploitation Tools Web exploitation tools are applications used to find weaknesses in web applications and secure networks. Penetration testers can use these tools...

Program Development

Program Development Implications of Using ZIP Codes on the 1NF, 2NF, and 3NF Rules The use of different data types and databases is commonplace in program development. Relational databases are data...